Please enable JavaScript in your browser to complete this form.
Step 1 of 11

1. Computers + Network Systems

1. Does the school have a dedicated and well-trained Information Technology (IT) staff to manage and secure its digital infrastructure?
2. Are comprehensive security plans in place for the school's computer and information systems, covering both hardware and software aspects?
3. Do teachers, staff, and students use strong, unique passwords and login information to access electronic files and systems?
4. Is regular cybersecurity training provided to teachers, administrators, staff, and students, focusing on safe computing practices such as phishing email identification and strong password creation?
5. Are cyber safety and anti-cyberbullying programs actively provided to educate students on digital well-being?
6. Do the school's computers and internet access include filtering mechanisms to monitor and restrict content, ensuring only approved websites are accessible?
7. Is there a systematic inventory of physical devices, software platforms, and applications to ensure comprehensive security management?
8. Are the roles and responsibilities related to cybersecurity clearly defined and communicated to all members of the school community, including third-party stakeholders?
9. Is there an Acceptable Use Policy (RUP) in place that outlines responsible digital behavior for students and staff?
10. Are student data and personally identifiable information secured in compliance with Federal and state regulations?
11. Has the school established an information security policy that is regularly reviewed and updated?
12. Are mechanisms in place to protect data-at-rest and data-in-transit from unauthorized access or breaches?
13. Are backup and data recovery processes regularly tested and maintained to ensure data integrity and availability?
14. Do students and educators have access to adequate and secure broadband internet, wireless connectivity, and digital devices for educational purposes?
15. Is antivirus software and other protective measures such as firewalls, pop-up blockers, and automated patching tools in use and regularly updated?
16. Does the school implement multi-factor authentication to enhance security for accessing sensitive systems and information?